An Efficient Architecture for Bandwidth Brokers in DiffServ Networks

Size: px
Start display at page:

Download "An Efficient Architecture for Bandwidth Brokers in DiffServ Networks"

Transcription

1 An Efficient Architecture for Bandwidth Brokers in DiffServ Networks Ch. Bouras K. Stamos Research Academic Computer Technology Institute, PO Box 1122, Patras, Greece and Computer Engineering and Informatics Dept., Univ. of Patras, GR Patras, Greece Tel: {960375, } Fax: {969016, } {bouras, Corresponding author: Ch. Bouras Research Academic Computer Technology Institute, N. Kazantzaki, University of Patras Campus, GR-26500, Rion, Patras, GREECE Telephone: Fax: Abstract In this article we examine the architecture of an entity used for automatic management and provisioning of resources for DiffServ networks. We examine the existing literature and implementations in this area, focusing on the design choices made, and we propose an architecture for the design of Bandwidth Brokers that combines an adaptive admission control algorithm for increased utilization of network resources and a mechanism for reducing the complexity overhead that intends to be both simple and effective. Specifically, we present a novel architecture for the admission control module that aims at achieving a satisfactory balance between maximizing the resource utilization for the network provider and minimizing the overhead of the module. We complement our theoretical discussion with extensive experimental simulations for the proposed Bandwidth Broker components and analysis of the results. The simulations study the possible configurations of the proposed algorithm and also compare it with alternative admission control policies. Keywords: DiffServ, Bandwidth Broker, adaptive admission control, SLA

2 1. Introduction The Differentiated Services (DiffServ) framework is one of the basic architectures that have been proposed for QoS provisioning in the Internet and is widely supported by network equipment vendors. Because the Internet consists of numerous network domains with each one acting as an autonomous system, just using the current DiffServ framework does not solve the problem of providing end-to-end QoS, since each domain may be incompatibly configured. One entity that has been proposed in order to overcome this problem and provide end-to-end QoS across network domains is the Bandwidth Broker. A Bandwidth Broker [1] entity is responsible for providing QoS within a network domain. It manages the resources within the specific domain by controlling the network load and by accepting or rejecting bandwidth requests. A user within the domain that is willing to use an amount of the network resources between two nodes, has to send a request to the Bandwidth Broker. The Bandwidth Broker chooses to either accept or reject a request based on the network load, its admission control policy and the Service Level Agreement (SLA). The SLA [6] is the service contract between the service provider and every customer that describes the service that both the costumer and the service provider have agreed upon. The decision to accept or reject a request is made by the admission control module. In the case that the requested resource is managed by multiple domains, the Bandwidth Broker is also responsible for the inter-domain communication with Bandwidth Brokers of adjacent domains. This procedure requires communication between adjacent Bandwidth Brokers and also a special agreement between the domains. In this paper we primarily focus on the admission control part of the Bandwidth Broker s operations. We propose an adaptive algorithm for resource reservation requests that arrive ahead of the actual time for which they request the resource reservation. This allows our algorithm to gather a set of multiple requests and examine them in order to make better utilization of the network, making use of the existing literature on scheduling problems. The algorithm then attempts to balance the calculation of the optimal solution with a limitation on the computational overhead that the algorithm itself incurs at the Bandwidth Broker operation. The importance of monitoring and adapting the computational overhead for the Bandwidth Broker can be highlighted when there is a high arrival rate of requests, while the requested bandwidth for each reservation is small. Such an example is the case of multiple VoIP requests at a high bandwidth link. We have designed the architecture so that it can be configured according to the specific parameters of each deployment (processing power of the Bandwidth Broker module, acceptable delays for notification from the Bandwidth Broker), so that the proposed solution is suitable for a variety of real-world cases. There are emerging types of networks, such as

3 wireless networks, where the demand for quality of service is strong, and where sophisticated solutions are applicable because of the nature of the wireless environment: smaller capacity links compared to wired networks, frequent and more unpredictable entry of new users for the existing resources. Other research teams have already taken over the work presented in this paper in order to apply it to wireless environments. For network providers, utilization of the network resources and maximization of revenue is one of the most important aspects of the Bandwidth Broker s operation. Our approach focuses on the maximization of the used bandwidth, in the assumption that the network provider s revenue will depend on the product of the bandwidth requested by a reservation, times its duration, which corresponds to the network utilization and more closely represents the actual cost that the serving of a request incurs to the network. Other models can also be used, such as the maximization of the number of admitted requests, in case there is a flat pricing model. Our performance evaluations examine this aspect of the algorithm s performance as well. The rest of the paper is organized as follows: Section 2 discusses related work in the areas of architectural design, the admission control module of a Bandwidth Broker and the possible distribution of its functionalities. In this section we examine and compare the characteristics of some of the most important already existing architectures. Section 3 describes our proposed algorithm for a centralized admission control module, which is evaluated through simulation in sections 5.1 and 5.2. Section 4 discusses the operation of the architecture at an interdomain level, while section 5 contains the simulations that were conducted in order to evaluate our proposals. Section 6 describes our final conclusions and the future work that we intend to do on this area. 2. Related Work 2.1. Admission Control Module Admission control means that the Bandwidth Broker has to define whether the incoming resource reservation requests will be accepted or not. Once a request has been accepted, the Bandwidth Broker has to make sure that it will be met by the network. Admission control is a very important part of the Bandwidth Broker operation, because it determines the fairness between the requests and the degree of network utilization that the Bandwidth Broker will achieve for the managed domain. An improperly designed admission control module can lead to low network utilization, unfairness and therefore frustration to the users that request resources or it can also impose an unacceptable overhead to the Bandwidth Broker s operation. However, since the operating circumstances can vary widely from one case to another, it is

4 improbable that a single solution will fit all operating requirements. Our approach tries to tackle this problem by incorporating an adaptive mechanism with the intent to converge to the suitable level for each deployment scenario. In general, we can separate the types of reservation requests depending on the actual time period for which they request resources. Immediate requests: When an immediate request is accepted, it is immediately effective, which means that the requested resources are reserved right away. This type of request leaves little room to the Bandwidth Broker for implementing a strategy that maximizes the network utilization. Book-ahead (or advance) requests: A book-ahead request specifies the resources that will be needed at some later point in time, which has to be specifically defined. The authors in [15] give a thorough presentation of the concept of book-ahead reservations, while a detailed discussion on the benefits and potential problems with book-ahead requests can be found in [16]. In general, book-ahead requests provide a richer functionality to the service and allow for better solutions to the admission control problem. There are a lot of actual cases in the real world where a book-ahead request meets the requirements of an application, like for example pre-arranged video conferences. Researchers have dealt with both types of admission requests. An approach that deals with both types of incoming requests is the resource partitioning proposed in [9], which separates the admission decision for immediate and bookahead requests. Immediate requests that were rejected can be reconsidered for a book-ahead reservation. In order to avoid wasting of resources because of fragmentation, the authors propose a moving boundary between the two partitions. The most common mechanism for admitting book-ahead requests is to divide time in intervals (slots) of equal size, and calculate the resources requested by a new reservation for the time slots that it overlaps [9], [10]. For both immediate and book-ahead requests, it may be possible to either specifically declare the ending time of the reservation, or not. An intermediate case is when a reservation request has to provide both its starting and ending times, but can make new additional requests that extend its initial reservation period. In [30], the authors present a Bandwidth Management Point (BMP) that uses centralized network state maintenance and pipe-based intra-domain resource management schemes in order to reduce the admission control time and the scalability problems. Another approach is used by [29], where SLA requests are converted by the border routers in messages of the COPS protocol and refined before they are sent to the Bandwidth Broker, which makes simple decisions based on the refined requests. In some cases, a book-ahead request may have a flexibility of allowing the Bandwidth Broker to answer the request by either accepting it or rejecting it not immediately, but after a period of time (which can be specified). Our algorithm

5 takes advantage of this flexibility, in order to calculate the most efficient admission decisions that maximize the network utilization and subsequently the network provider s profit. The provider may choose to allow requests that demand an immediate answer, balancing perhaps this capability with additional cost. Admission control can be done either on a hop-by-hop basis [5], [13] or on a per-flow basis [12]. The former case can be implemented by first calculating the path for an end-to-end reservation through a routing protocol like RIP or OSPF, and then run the admission control algorithm for each link in the calculated path. A number of data structures have been proposed for efficiently implementing an admission control algorithm. The most common are the simple implementation using an array, and various variations using trees like segment trees and binary search trees [5]. In the more general case, time is considered continuous and therefore reservations can start and end at any time. It is also very common however, to use slotted time, so that reservations are considered using a predefined granularity. Algorithms may either benefit from this granularity or completely depend on it for their operation [5]. Most related work for Bandwidth Brokers examines a request as soon as it arrives and accepts it if the reservation does not exceed the unreserved link capacity [11]. This approach has benefits in terms of speed and efficiency, but it can lead to low network utilization. In [8], the authors show how the general admission control problem can be formulated as an optimization problem, with the goal of maximizing the net revenue. The network utilization can improve drastically if we allow the Bandwidth Broker s admission control to gather a number of requests and compute a better allocation of resources. This is the approach we have taken in this paper. Also [7] deals with price-based admission control, studying both online (when answers to requests have to be issued immediately) and offline (when requests can be gathered and evaluated) versions of the problem are discussed. Our work combines the above approaches with an adaptive scheme that attempts to achieve a preferable balance between optimal utilization of the network and minimal overhead for the Bandwidth Broker operation. An adaptive scheme designed for the scheduling of popular video on demand that also uses delayed notification is presented in [17]. In [27], the admission control approach taken by the TEQUILA project is presented, which is based on a feedback model that can be tuned by operational policies and strategies. Its main characteristic is that it is based on the ability of the network to provide QoS using functions that dimension the network on the basis of anticipated demand, and on the actual status of the network using measurements.

6 2.2. Centralized and distributed architectures: Comparison description and discussion In this section we present proposed bandwidth architectures from the relevant literature on the design of Bandwidth Brokers ([19], [23], [24], [25]). Our intention is to outline the advantages and disadvantages of the different strategies for the Bandwidth Broker design. A lot of researchers have worked on this area producing various solutions, each of which is potentially suitable for several situations and weak on others. A survey on existing Bandwidth Broker implementations can be found in [14]. Table 1: Comparison table of various Bandwidth Broker architectures University of Kansas MIPTel QBone UCLA CTI NS-2 implementation Architecture Centralized Centralized Centralized, can be extended for distributed Distributed Distributed Admission Control Maintains and consults policy database Pre-configured bandwidth threshold Traffic demand matrix Accepted if SLA is not violated Restricted by available bandwidth Routing table No Yes Yes Yes No Security Not defined Not defined Not defined Not defined Not defined Robustness / Not defined Not defined Recovery actions from Recovery actions Not defined Failure recovery most common failures from most common failures Interdomain interface Intradomain interface User interface TCP sockets for Linux routers / Telnet automated script for Cisco routers TCP sockets for Linux routers / automated script for Cisco routers Custom protocol Custom protocol Custom protocol TCP Custom protocol COPS / SNMP / Telnet COPS TCP Web-based GUI message exchange GUI, Host/User, Server / Web-based GUI Gateway Interface (PHP) Some of the architectures presented in the comparison Table 1 have been implemented, like the University of Kansas and the UCLA architectures, while others are theoretical or at the design phase. The table offers a view of the wide variation between the characteristics of the various proposed and implemented Bandwidth Broker architectures that one can find in the current literature. Most of the existing literature proposes Bandwidth Brokers that comprise of a central module that deals with functionalities such as admission control, inter-domain communication, maintaining a routing table interface, connecting to the network routers and sending the proper configuration parameters. In order to overcome the scalability issues that are associated with a centralized Bandwidth Broker model and to avoid having the Bandwidth Broker as the bottleneck while the network itself is underutilized, the authors in [12] propose a distributed Bandwidth Broker architecture. Their design is comprised of one central Bandwidth Broker (cbb) and a

7 number of edge Bandwidth Broker (ebb) in the domain. There are two levels that represent the QoS states, link level and path level. The idea is to maintain databases with information regarding both the reservations on the link and on the path level. The path level database information is extracted from the link QoS state database. While however the link state database is only maintained by the cbb, each of the ebbs maintains a mutually exclusive subset of the path state database, and can therefore handle the admission control load for the relevant paths. The authors then propose a number of variations on how the admission requests can be handled, depending on whether they will be accepted or not. Also [28] implements a hierarchical scheme of Bandwidth Brokers by dividing the domain into small areas, each with its own Bandwidth Broker, and a parent Bandwidth Broker at the domain level. Comparing the distributed architectures with the centralized model, we note that while the distributed architectures offer scalability advantages over the centralized model, they offer inferior resource management and introduce bandwidth wastage along the paths. Furthermore, if the link database needs to be frequently accessed, the processing overhead can increase and become counter-productive. Another important comparison point is the robustness of each solution and its behavior in unexpected or undesirable circumstances. Failures at a network component can be categorized as follows: The component does not operate at all. The component operates erroneously and sends unexpected and unknown messages to its communicating nodes. The component is overrun by a malicious entity (e.g. a virus) and appears to be sending valid messages but it does not obey the proper behavior and tries to downgrade, corrupt or completely halt the proper operation of the architecture. The last two categories are also called Byzantine behaviors and can be summarized as states where the component operates in an arbitrary fashion, not according to the algorithm it was designed to follow. We also mention another trade-off between the centralized and the distributed classes of architectures: A distributed architecture can be designed in such a way that greater robustness and tolerance for some failed entities of the Bandwidth Broker architecture, while a centralized architecture has a single point of failure. On the other hand, it is much easier to secure and closely protect a single Bandwidth Broker entity, than it is to safeguard and scrutinize the behavior of a multitude of components that comprise a distributed Bandwidth Broker architecture. Furthermore, a distributed architecture also has to take into account the issue of consistency between the components that comprise the Bandwidth Broker. This is also true in some cases of a single Bandwidth Broker entity, where in order to increase robustness, additional backup components are introduced (like a duplicate Bandwidth Broker).

8 It also has to be taken into account, that the relative pros and cons of the architectures are affected by the deployment environment. Since the first category of failures (complete shutdown of the failed component) are usually much more easily discovered and more desirable than the rest of the failure categories, if the Bandwidth Broker architecture is implemented and deployed at an environment where such failures can be ruled out, the relevant types of considerations can naturally be discarded. Our proposal presented in the sections below is based on a centralized module, while an attempt to examine possible benefits from a distributed architecture can be found in [4]. 3. Description of Admission Control Algorithm We define standby requests as requests that have not yet received an answer (either confirmation or rejection). Confirmed is a book-ahead request that has received an affirmative answer but waits to be activated. These states are shown in Figure 1. idle tend active reject request tstart standby accepted confirmed Figure 1. Request states For a DiffServ domain, it is not efficient to keep per-flow status in the core routing devices, and therefore an aggregated approach is used at the core routers. Admission control is performed by the Bandwidth Broker at the domain scale, using the hose model [26] that has been proposed for VPN provisioning. Its basic idea is that bandwidth management is simplified by assigning a limit at the bandwidth that each edge router is allowed to accept in the domain. Its operation assumes that proper dimensioning of the network has taken place and that part of the available bandwidth for the links has been assigned to the management of the Bandwidth Broker for the DiffServ service. We have to note here, that this does not mean that all or most of the reservation requests will be necessarily accepted, but that the network design will guarantee that there will be enough resources in order to service the reservation requests that have been accepted. The

9 hose model has the benefit of offering the flexibility to the edge device of sending traffic to a set of endpoints without having to specify the detailed traffic matrix and can also reduce the required size of access links through multiplexing gains because of the aggregation of flows between endpoints. Various methods of implementing the hose service model are given in [26]. Our approach decouples the admission control decision from the routing issues. This means that core routers are not involved in the process of admission control and signalling. Furthermore, while combining routing decisions with admission control can be beneficial, it is not always possible, or desirable for scalability reasons. Packets of a specific flow can be routed using different paths, without affecting the admission control process. An important problem for admission control and dimensioning of network resources is how to take into account the burstiness and self-similar behavior of network traffic. The problem can be simplified by defining a unifying parameter for the characteristics of network resources that accurately captures their effect on resource usage. Various researchers ([38], [39], [40]) have dealt with the concept of effective bandwidth, which can be computed based on traffic parameters such as mean rate or maximum burst size. It is an additive amount of bandwidth that is large enough in order to guarantee that the QoS requirements of all flows are met. We suppose a new request has the form of r(t start,t end,b,w) (1) where t start and t end are the starting and finishing times for the reservation, b is the requested bandwidth and w is the period for which the request can wait until it receives either a confirmation or a rejection of the reservation. Our model is based on the peak rate allocation, so that each request specifies its maximum transmission rate and the admission control module has to make sure that the sum of all peak rate does not exceed the allocated service capacity. Bandwidth is defined at Layer 3, as the maximum amount of bits/second of IP traffic, including the IP header that an end point may insert to the network. The Bandwidth Broker s admission control module keeps a list of unanswered requests, which we call waiting queue W q, sorted by their starting time t start. As soon as any item in W q, say r 1 (with the closest w to the current time) is about to expire, the admission control module calculates the answers that it will provide to this and a number of other requests, essentially by solving an offline scheduling problem: Suppose n is the cardinality of W q. We define R={r 1, r 2,, r m } W q (2) and we want to find a subset R c R such that Σ ri Rc b i B at any time point where B is the total available bandwidth for the service (defined by the dimensioning for the DiffServ service according to the hose model) and try to maximize

10 Σ ri Rc b i throughout the period from the earliest t start to the latest t end in the R set. R c is the set of requests that will be accepted by the algorithm, while requests in the set R-R c will be rejected. This problem is NP-complete [18] and therefore it is proposed to use an approximation algorithm to solve the following linear programming relaxation in polynomial time [7] and then make the solution discrete regarding the variables x i, which represent whether r i is accepted or not: max Σ i R b i (t end -t start )x i Σ i R(t) b i x i B, for all t (earliest t start, latest t end ) in R 0 x i 1, i R bandwidth bandwidth limit r3 r1 r2 r4 r5 r6 time Figure 2. Reservation requests In order to avoid approximation of the solution, this problem can be solved using integer linear programming, which however becomes very costly computationally as the problem instance increases (which happens for a high rate of incoming requests). A mechanism monitoring the instance size and carefully adapting it is needed in this case. The important point is how to select the R set. A simple approach would be to simply set R=W q. This solution however can become computationally costly, and it can furthermore lead to low network utilization, because requests that have been made very far in advance will probably have little competition, and will therefore be most likely accepted. In the example in Figure 2, this can be demonstrated by request r 6. If r 6 is included in the R set as soon as r 1, it will certainly be accepted, since there it has no other competition. It would be better though to delay the decision for r 6, since by that time other requests (more profitable than r 6 ) could have arrived. Including in R only requests that overlap with t end for r 1 may also not be an attractive solution, because it might require the algorithm to be invoked too frequently, and that could introduce an unacceptable overhead. In Figure 2, the algorithm will have to separately be invoked for r 1, r 3, r 5 and r 6. As our algorithm does not provide for overbookings, we have also drawn a line that shows the maximum bandwidth that can be allocated to the requests.

11 In order to combine the benefits of both these extremes and reduce their shortcomings, our solution is to have an adaptive parameter for the size of R, which will increase if the number of requests in W q increases or if the algorithm was very time-consuming, and decrease otherwise, according to: if (C k-1 -T>T) R size(k) = 1 else if (C k-1 -T>0) R size (k) = (1-(C k-1 -T)/T) R size (k-1) else R size (k) = R size (k-1) + (W q -R size (k-1))*a C k-1 is the duration of the previous computation of the requests to be accepted, a is a parameter that determines the increase rate of R size and T is a threshold value of the maximum allowable time for a computation. Configuring parameter a determines how close to W q we want the size of the R set to become after an increase, so a is essentially the adaptation factor of the algorithm s operation. The above pseudocode guarantees that if the algorithm lasts more than an accepted threshold, it will be simplified to admission control for a single request, which is the simplest computation possible and we can reasonably expect to reduce the computational overhead to very low levels, from which the algorithm can slowly progress to more complex computations according to the adaptation parameter a. In general, an adaptive scheme can have problems of oscillation between extreme values, so we have considered the above scheme that does not sharply increase or decrease the size of the R set, except for the case that for some reason the computation time far exceeds the acceptable threshold. As an example, if the last computation lasted more than twice the predefined threshold, then the size of the subset R that will be examined for the current computation is reduced to 1, and therefore the computation is simplified to examine whether accepting the next request violates the resource restrictions or not. The assumption is that in that case the computation of an optimal solution is adding a large overhead to the Bandwidth Broker s operation, and we therefore simplify the computation as much as possible. In the case that the computation time exceeds the threshold but not twice its value, we assume that the overhead is significant and must be reduced (but is not unacceptable as in the previous case). We reduce it by a factor of 1-(C k-1 -T)/T, so that the reduction becomes more aggressive as C k-1 becomes larger. Finally, if the computation time is still below the threshold, we assume that there is space for increasing the computation overhead by increasing the size of the subset R, and this is done using a factor a (0,1). The closest to 1 this factor is chosen, the more aggressive the increase is, with the obvious limit of the size of the whole W q.

12 In general, finding an optimal solution to the problem of optimally scheduling the requests is NP-complete, since the Knapsack problem, which is known to be NP-complete [18], is equivalent to a simpler version of our scheduling problem where all t start and t end times are equal. Because however it is not critical to have the optimal solution, we can either use an approximation scheme that runs in polynomial time and approximates the optimal solution with the desired accuracy, or try to limit the instance size of the problem in order to be within the computational capabilities of the underlying equipment. Following is a summary of the algorithm for calculating the accepted requests at an ingress point of the domain: while (W q not empty) while (next request has not expired) forall i where (b i > B) x i = 0 // reject overbooking requests Solve LP maximization: max Σ i R b i (t end -t start )x i Σ i R(t) b i x i B, forall t (earliest t start, latest t end ) in R x i {0,1}, i R exit loop end while if ((C-T)>=T) R size = 1 else if ((C-T)>0) R size = (1-(C-T)/T)* Rsize else R size = R size + (W q -R size )*a end while If the current computation takes too long and w 1 is about to expire, the computation is ignored and a simpler fall-back mechanism is used which will individually examine r 1 and then restart the computation for R-{r 1 }. Because of the way the algorithm is constructed, it is not generally optimal on network utilization. As we have mentioned, we make this trade-off in order to reduce the computation overhead for the Bandwidth Broker module. A very fast processing module (or conversely a low rate of admission requests) lead the algorithm to quickly converge to a good approximation of the optimal solution. Thus, assuming that the computation time does not reach or exceed the threshold, we have that R size (t) = R size (t-1) + (W q - R size (t-1))*a Solving the recursive function gives R size (t) = (1-a) t-1 R size init + (1+(1-a)+ +(1-a) t-2 )W q *a

13 and therefore 1 (1 R size (t) = (1-a) t-1 R size init + (1+(1-a) a a t ) 2 )W q *a (3) where R size init is the initial size of R. Therefore, R size converges to the size of W q as quickly as (1-a) t converges to near-zero values, which happens quite rapidly, especially if a has been chosen close to 1, which means a very high adaptation capability. The algorithm is also not fair with respect to maintaining a First Come-First Served order (since an earlier request might be rejected in favour of a later request that will better utilize the network), but it guarantees efficient operation with respect to the response to requests (it assures that all requests will be answered on time, either positively or negatively) and it respects each request s maximum waiting time w. Compared to a simpler admission control algorithm that examines the requests as they arrive, our proposal also is more cautious against big requests that consume a lot of bandwidth for a long duration. The reason is that whereas a simple admission algorithm would accept a big request and then starve the rest of the requests until the big request was satisfied, our proposal examines requests over a larger time period and is therefore capable of promoting large number of small requests (that make better utilization of the network because they are more capable of filling availability holes ) than a single big request that blocks most of the subsequent requests. This theoretical assumption is also experimentally examined in the evaluation section of our work. 4. Interdomain reservations Dealing with interdomain reservations is a very important but also difficult and relatively untouched issue in practical environments. Some efforts (Geant2 JRA3 [34], DRAGON [35]) have focused on the automated interdomain provisioning of Layer 2 services, while Geant2 SA3 [36] have been working on the automated multi-domain provisioning of Differentiated Services. Other proposals include the one from the TISPAN standardization body of the European Telecommunications Standards Institute (ETSI) [41], which has produced the Resource and Admission Control Subsystem (RACS) specification identified in the overall TISPAN Next Generation Networking (NGN) architecture. RACS [42] is the TISPAN NGN subsystem, responsible for elements of policing control including resource reservation and admission control in the access and aggregation networks. In the specific area of providing end to end QoS requirements for a PSTN grade voice and multi-media service, the MultiService Forum (MSF) has proposed a QoS solution [43] and considered how it might best be supported over a packet network infrastructure. This solution has a number of components, among which is the Bandwidth Manager [44], and has chosen to adopt the DiffServ PIB (Policy Information

14 Base) for the interface between the Bandwidth Manager and the edge routers of a domain. It covers hierarchical organization of Bandwidth Manager components, and reservations between managers in adjacent domains. Additionally, an end to end QoS solution has also been defined by 3GPP [45], and it incorporates a Policy Decision Function that approximates part of the Bandwidth Broker functionality discussed here. The 3GPP proposal is mainly specialized on 3G mobile networks and defines its own PIB for interfacing to the Policy Decision Function. There are a number of issues that have to be resolved for efficient interdomain reservations to work, which include compatibility in the technology and architectures, SLA negotiation, pricing, routing, restoration and authentication issues. One of the basic aims of the Bandwidth Broker concept was to give a uniform solution to some of these issues. Our proposed admission control algorithm can be adapted in several ways in a multi-domain environment. A basic criterion is how the routing function for the end-to-end reservation will take place. End-to-end routing that requires full knowledge of intra-domain topology is an efficient but practically not feasible solution. Even if domain managers were willing to share full internal topology, updating and using such information becomes a very complex procedure. A first level of inter-domain routing (where domains are considered black box nodes and only interdomain links are taken into account) is necessary. This level of domain routing can be performed in 2 ways: The source domain determines all domains that will have to be traversed until the destination domain is reached. The source domain only determines the next adjacent domain, and each domain in turn determines the next domain until the destination domain is reached. Also admission control can take place in two ways: All domains that are involved in the reservation simultaneously process the reservation. Every domain waits for a positive answer from the preceding domain before it starts its own admission process. The first option suits better the characteristics of the proposed admission control algorithm, because by simultaneously examining the reservation requests, each domain has the capability to gather multiple requests and better utilize its resources without delaying the overall process. However, our solution does not exclude any option for the admission control at the interdomain level, which is an issue we intend to further investigate in the future. Regarding inter-domain security, the effort on this area has concentrated on securing protocols such as the Simple Inter-domain Bandwidth Broker Signaling (SIBBS [20], [22]) protocol, that deal with the Bandwidth Broker communication across domains. The SIBBS protocol is proposed by the Internet2 community in order to implement the inter-domain communications of resource reservation between the Bandwidth Brokers. It exchanges two pairs of messages

15 for QoS configuration purposes, the Resource Allocation Request (RAR) / Resource Allocation Answer (RAA) messages to request for a service, and the CANCEL / ACK messages to terminate the requested service. The transmitted information is sensitive and therefore has to be protected against possible security compromises. In [21], the authors outline the main security threats that inter-domain Bandwidth Broker communication has to protect against, and explain how the Public Key Infrastructure (PKI) can be integrated in order to produce a secure SIBBS implementation. Their implementation offers authentication, integrity, timeliness and non-repudiation services based on the PKI technologies. Communication between Bandwidth Brokers is encrypted in order to protect against the types of attacks described in the previous chapter. 5. Performance Evaluations 5.1. Evaluation setup and admission control module configuration Before assessing the performance of the algorithm compared with alternative admission control techniques, we decided to examine the adaptive properties of the algorithm and its behaviour according to the tuning of the configurable parameters. For this phase of experimentation we used a simulated system that accepted random requests (requests that did not follow a specific pattern in terms of their arrival time or reservation requests), in order to study the performance of the algorithm and the effect of the computation time threshold and adaptation parameter a on the behavior of the algorithm. Our simulated system was running on an Intel-based PC with 512MB of memory running Windows The simulations examined a high-level view of the network, without taking into account details at the packet level since our main focus is on examining the relative performances of the algorithms and isolating these from impact by external or low-level parameters. The parameters for each request were randomly produced [31] within suitable boundaries (regarding the total duration of each simulation, the total available bandwidth, and the minimum and maximum reservation requests) for each situation that we wanted to simulate. Maximum available bandwidth for the service were set at 50 Mbps, while the duration of each simulation was set at 30 time slots. The source code and configurations for our simulations and experiments can be found at [33].

16 threshold=3, a= requests examined time Figure 3. Examined requests for smaller threshold threshold=4, a=0.1 requests examined time Figure 4. Examined requests for medium threshold Figure 3, Figure 4 and Figure 5 display the adaptive operation of the algorithm. In Figure 3 where a smaller threshold has been defined, we can see that in no case are more than 4 requests examined simultaneously, and therefore the computation time for approximating the integer linear programming solution is bounded on this threshold of the size of the input. Similarly, in Figure 4 where the threshold has increased, the algorithm can gather more requests and therefore achieve better network utilization. Figure 5 displays the examined requests for an even largest threshold, that still does not permit examining more than 8 simultaneous requests. In all cases the algorithm probes for larger sizes of the R set, until the point where the computation time threshold is reached. At that point the algorithm retreats, as can be seen in Figure 3, Figure 4 and Figure 5.

17 threshold=5, a=0.1 requests examined time Figure 5. Examined requests for larger threshold In the presented simulations the value of adaptation parameter a was identical at 0.1, which produces a cautious behaviour of the algorithm. The size if the examined set R is adapted gradually. Larger values of a produce sharper increases and reductions of the R set. This can be observed in Figure 6, Figure 7 and Figure 8, which display the adaptive behaviour of the algorithm when the a value is doubled at 0.2. The algorithm tends to examine a larger number of requests (using a larger R set), but the threshold is also exceeded more often and the algorithm has to adapt to smaller sets of examined reservation requests. This behaviour is magnified depending on the adaptation parameter. As Figure 9 illustrates, our simulations showed that larger values for the adaptation parameter are not suitable for the proposed algorithm. We therefore determined that in order to avoid an oscillatory behaviour it is better to keep the adaptive parameter a around the 0.1 range of values and not larger than 0.5. threshold=3, a=0.2 8 requests examined time Figure 6. Examined requests with smaller threshold and aggressive adaptation

18 threshold=4, a=0.2 requests examined time Figure 7. Examined requests with medium threshold and aggressive adaptation threshold=5, a=0.2 requests examined time Figure 8. Examined requests with larger threshold and aggressive adaptation threshold=3, a= requests examined time Figure 9. Examined requests with very aggressive adaptation 5.2. Comparative evaluations Our next set of experiments was designed in order to evaluate the admission control algorithm s performance in terms of the achieved acceptance rate and network utilization. For this reason, we implemented our proposal in the popular ns-2 network simulator [32], running on an Intel-based Linux PC with 288 MB of main RAM memory available

19 and a Pentium III Coppermine with 256 KB cache memory on the processor chip, which operated at the frequency of 700MHz. The parameters for each request were randomly produced within suitable boundaries (regarding the total duration of each simulation, the total available bandwidth, the minimum and maximum reservation requests) for each situation that we wanted to simulate, and each set of requests designated a specific ingress point at the network (so all requests competed for the same resource limit at the ingress point of the simulated network). We simulated a scenario where every request had to specify a steady amount of bandwidth for a specific duration with specific time bounds (there was no possibility for a request to specify a variable bandwidth rate). Randomness was obtained by using the ns-2 RNG class. This class contains an implementation of the combined multiple recursive generator MRG32k3a [37]. The MRG32k3a generator provides 1.8x10 19 independent streams of random numbers, each of which consists of 2.3x10 15 substreams. Each substream has a period (i.e., the number of random numbers before overlap) of 7.6x The period of the entire generator is 3.1x More specifically, the random generator was independently generating numbers that were then assigned to each of the attributes for a new request. If the random combination of attributes was invalid (for example the start time of the reservation was after the stop time of the reservation etc.) the request was discarded as if it had never been generated. Otherwise, it was generated by the node and sent to the Bandwidth Broker for examination. In order to see how each algorithm could scale, we experimented with generating up to 1000 requests in a 50 second interval. Listings of the random requests generated, as well as the source code for replicating our results in ns-2 can be found in [33]. The topology defined at the simulator was a star network, with the Bandwidth Broker module being located in the centre and requests originating from one leaf node towards another leaf node of the network. The links of the simulation represented the provisioning of hoses as defined in [26]. Maximum available bandwidth for the service was set at 100 Mbps, while the duration of each simulation was set at 50 time slots. For the adaptive algorithm the results were obtained setting the adaptation parameter a at a value of 0.2 (moderate adaptation) and a computational threshold of both 5 and 10 time slots. The test case examined in our experiments represents the requirements of a network providing QoS to a large number of discrete end users. These end users might require end-to-end QoS guarantees for specific applications, such as VoIP or videoconferencing, with varying start / end times and resources. Such a network has typically performed dimensioning at its core, which is modeled by the VPN model referred in this paper. The deployment of an automated resource brokering mechanism is also necessary in this case. The inter-domain negotiations and signaling is more thoroughly covered in the previous sections and the related work, while our experiments focus on the admission control procedure.

20 Our main goal was to study the operation of the adaptive admission control algorithm (from now on called AAC) at a more realistic setting and compare their performance with other alternatives. In particular, the alternatives we studied are the Simple Admission Control (from now on called SAC), which examines each request on its own and accepts it if there are enough resources to satisfy it, and the Price-Based Admission Control algorithm (from now on called PBAC), which makes a decision on which requests will be accepted trying to optimize the network utilization by gathering and evaluating a group of requests. In order to solve the NP-complete problem that arises, an approximation algorithm is used which can approximate the optimal solution within a specified range. This type of admission control is similar to the offline version of the algorithm presented in [7]. We have selected the above algorithms for evaluation, because their comparison can provide a good insight in the characteristics we are interested in studying. SAC is the simplest algorithm and therefore a good benchmark for the more complicated solutions. PBAC lacks adaptive capabilities, allowing us to identify the effect they have on the simulated environment. The main metrics that we are interested in, in order to compare the performance of the algorithms and evaluate the relative advantages and weaknesses of each, are: The acceptance rate, which shows the percentage of requests accepted out of the total number of submitted requests. In case that a flat pricing model is followed (where there is a standard profit per reservation) this metric also corresponds to the network provider s revenue. The generated profit for the provider, which is calculated as the product of the bandwidth consumption of each reservation times its duration. This is of course a convention since the pricing model can vary depending on the specific circumstances. We believe though that such a metric is one of the most representative ones, since it can be understood as the amount of resources that is consumed by a reservation and the sum for all reservations shows the network utilization that each algorithm achieves. We are also interested in the average profit achieved per request, which can be in several environments an additional indicator of the effectiveness of the algorithm. In an environment for example when there is an additional overhead to the provider for signaling and allocating a new reservation, it would be beneficial to achieve better network utilization per individual request. The delay of being able to deliver either positive or negative answers to the submitted requests. The average size of the set of requests examined together, which is a measure of the complexity of the optimization problem solved, and therefore of the overhead to the system. For each experiment we have measured the percentage of accepted requests, the delay that was required before the Bandwidth Broker would reply to a request and the percentage of network utilization achieved by each algorithm. The

21 values reported are averages from multiple executions of the simulations, which generally produced identical or very similar results. These results are summarized in Table 2, where average values are presented for each algorithm. Repeating the experiments with the same distribution of requests per time slot produces very similar results (within 5%) regarding the average values, which leads us to believe that the results are representative of the behaviour of the algorithms in the ns-2 simulation environment. Table 2. Summary of results Averages per algorithm Acceptance rate Average delay (time slots) Average network utilization (bytes x time slots) SAC 29.60% PBAC 21.79% AAC thr= % AAC thr= % The following figures display in more detail the behaviour of the algorithms under different experiments with different request frequencies, and they help reveal the features of each algorithm, its relative weaknesses and strengths. Acceptance rate 50,00% acceptance rate 40,00% 30,00% 20,00% 10,00% PBAC AAC thr=5 SAC AAC thr=10 0,00% requests per time slot Figure 10: Comparison of acceptance ratios Network utilization (total profit) profit / request (bytes x time) Millions requests per time slot PBAC AAC thr=5 SAC AAC thr=10 Figure 11: Network utilization

Comparative Evaluation of Adaptive Price-based Admission Control Algorithms for Bandwidth Allocation

Comparative Evaluation of Adaptive Price-based Admission Control Algorithms for Bandwidth Allocation Comparative Evaluation of Adaptive Price-based Admission Control Algorithms for Bandwidth Allocation Ch. Bouras K. Stamos Research Academic Computer Technology Institute, PO Box 1122, Patras, Greece and

More information

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Christos Bouras and Dimitris Primpas Research Academic Computer Technology Institute, N.Kazantzaki

More information

Implementation of a leaky bucket module for simulations in NS-3

Implementation of a leaky bucket module for simulations in NS-3 Implementation of a leaky bucket module for simulations in NS-3 P. Baltzis 2, C. Bouras 1,2, K. Stamos 1,2,3, G. Zaoudis 1,2 1 Computer Technology Institute and Press Diophantus Patra, Greece 2 Computer

More information

A host selection model for a distributed bandwidth broker

A host selection model for a distributed bandwidth broker A host selection model for a distributed bandwidth broker Christos Bouras Dimitris Primpas Research Academic Computer Technology Institute, Ν.Κazantzaki Str., Patras University 26500 Rion, Patras, Greece

More information

A Bandwidth-Broker Based Inter-Domain SLA Negotiation

A Bandwidth-Broker Based Inter-Domain SLA Negotiation A Bandwidth-Broker Based Inter-Domain SLA Negotiation Haci A. Mantar θ, Ibrahim T. Okumus, Junseok Hwang +, Steve Chapin β θ Department of Computer Engineering, Gebze Institute of Technology, Turkey β

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Protecting Network Quality of Service Against Denial of Service Attacks

Protecting Network Quality of Service Against Denial of Service Attacks Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves Peter Wurman NC State University S. Felix Wu U.C. Davis Dan Stevenson Xiaoyong Wu MCNC DARPA FTN PI Meeting January

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Converged Networks. Objectives. References

Converged Networks. Objectives. References Converged Networks Professor Richard Harris Objectives You will be able to: Discuss what is meant by convergence in the context of current telecommunications terminology Provide a network architecture

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

1 Energy Efficient Protocols in Self-Aware Networks

1 Energy Efficient Protocols in Self-Aware Networks Energy Efficient Protocols in Self-Aware Networks Toktam Mahmoodi Centre for Telecommunications Research King s College London, London WC2R 2LS, UK Stanford NetSeminar 13 December 2011 1 Energy Efficient

More information

Frame Relay. Frame Relay: characteristics

Frame Relay. Frame Relay: characteristics Frame Relay Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Frame Relay: characteristics Packet switching

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

An Admission Control and Deployment Optimization Algorithm for an Implemented Distributed Bandwidth Broker in a Simulation Environment

An Admission Control and Deployment Optimization Algorithm for an Implemented Distributed Bandwidth Broker in a Simulation Environment An Admission Control and Deployment Optimization Algorithm for an Implemented Distributed Bandwidth Broker in a Simulation Environment Christos Bouras and Dimitris Primpas Research Academic Computer Technology

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 36 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

IP Differentiated Services

IP Differentiated Services Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. 7. IP Diffserv introduction Pag. 1 IP Differentiated Services Providing differentiated services in IP networks

More information

NetOp Policy Manager Resource Admission Control Service (RACS) Delivers Content-Driven QoS for Optimal Video-On-Demand Experience

NetOp Policy Manager Resource Admission Control Service (RACS) Delivers Content-Driven QoS for Optimal Video-On-Demand Experience Service (RACS) Delivers Content-Driven QoS for Optimal Video-On-Demand Experience April 2009 White Paper Resource Admission Control is a critical component in delivering bandwidth intensive and content-driven

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Deploying MPLS & DiffServ

Deploying MPLS & DiffServ Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

WHITE PAPER Application Performance Management. The Case for Adaptive Instrumentation in J2EE Environments

WHITE PAPER Application Performance Management. The Case for Adaptive Instrumentation in J2EE Environments WHITE PAPER Application Performance Management The Case for Adaptive Instrumentation in J2EE Environments Why Adaptive Instrumentation?... 3 Discovering Performance Problems... 3 The adaptive approach...

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Network Layer: Routing

Network Layer: Routing Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Source Routing Algorithms for Networks with Advance Reservations

Source Routing Algorithms for Networks with Advance Reservations Source Routing Algorithms for Networks with Advance Reservations Lars-Olof Burchard Communication and Operating Systems Technische Universitaet Berlin ISSN 1436-9915 No. 2003-3 February, 2003 Abstract

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

set active-probe (PfR)

set active-probe (PfR) set active-probe (PfR) set active-probe (PfR) To configure a Performance Routing (PfR) active probe with a forced target assignment within a PfR map, use the set active-probe command in PfR map configuration

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

WHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management

WHITE PAPER: ENTERPRISE AVAILABILITY. Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management WHITE PAPER: ENTERPRISE AVAILABILITY Introduction to Adaptive Instrumentation with Symantec Indepth for J2EE Application Performance Management White Paper: Enterprise Availability Introduction to Adaptive

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Performing Path Traces

Performing Path Traces About Path Trace, page 1 Performing a Path Trace, page 13 Collecting QoS and Interface Statistics in a Path Trace, page 15 About Path Trace With Path Trace, the controller reviews and collects network

More information

WAN Edge MPLSoL2 Service

WAN Edge MPLSoL2 Service 4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).

More information

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System

A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System A DiffServ IntServ Integrated QoS Provision Approach in BRAHMS Satellite System Guido Fraietta 1, Tiziano Inzerilli 2, Valerio Morsella 3, Dario Pompili 4 University of Rome La Sapienza, Dipartimento di

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 37 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750-E or 3560-E switch. With QoS,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Internet QoS : A Big Picture

Internet QoS : A Big Picture Internet QoS : A Big Picture Xipeng Xiao and Lionel M. Ni, M, Michigan State University IEEE Network, March/April 1999 Oct 25, 2006 Jaekyu Cho Outline Introduction IntServ/RSVP DiffServ MPLS Traffic Engineering/CBR

More information

Before configuring standard QoS, you must have a thorough understanding of these items:

Before configuring standard QoS, you must have a thorough understanding of these items: Finding Feature Information, page 1 Prerequisites for QoS, page 1 QoS Components, page 2 QoS Terminology, page 3 Information About QoS, page 3 Restrictions for QoS on Wired Targets, page 41 Restrictions

More information

CS 218- QoS Routing + CAC Fall 2003

CS 218- QoS Routing + CAC Fall 2003 CS 218- QoS Routing + CAC Fall 2003 M. Gerla et al: Resource Allocation and Admission Control Styles in QoS DiffServ Networks, QoS-IP 2001, Rome, Italy. A. Dubrovsky, M. Gerla, S. S. Lee, and D. Cavendish,Internet

More information

Using MSDP to Interconnect Multiple PIM-SM Domains

Using MSDP to Interconnect Multiple PIM-SM Domains Using MSDP to Interconnect Multiple PIM-SM Domains This module describes the tasks associated with using Multicast Source Discovery Protocol (MSDP) to interconnect multiple Protocol Independent Multicast

More information

Multimedia Networking. Network Support for Multimedia Applications

Multimedia Networking. Network Support for Multimedia Applications Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)

More information

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification: Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services 1 Computer network and QoS QoS ATM QoS implementations Integrated Services Differentiated Services Quality of Service (QoS) The data transfer requirements are defined with different QoS parameters + e.g.,

More information

Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator

Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Stanley Bak Abstract Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid

More information

TCP and BBR. Geoff Huston APNIC. #apricot

TCP and BBR. Geoff Huston APNIC. #apricot TCP and BBR Geoff Huston APNIC The IP Architecture At its heart IP is a datagram network architecture Individual IP packets may be lost, re-ordered, re-timed and even fragmented The IP Architecture At

More information

Quality-of-Service Option for Proxy Mobile IPv6

Quality-of-Service Option for Proxy Mobile IPv6 Internet Engineering Task Force (IETF) Request for Comments: 7222 Category: Standards Track ISSN: 2070-1721 M. Liebsch NEC P. Seite Orange H. Yokota KDDI Lab J. Korhonen Broadcom Communications S. Gundavelli

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

Some Thoughts on Multi-Domain Routing Ross Callon

Some Thoughts on Multi-Domain Routing Ross Callon Internet Draft R. Callon Digital Equipment Corporation July, 1991 Some Thoughts on Multi-Domain Routing Ross Callon Digital Equipment Corporation July, 1991 Status of this Memo This internet draft is an

More information

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Scalability Considerations

Scalability Considerations 3 CHAPTER This chapter presents the following steps to selecting Cisco products for a VPN solution: Sizing the headend Choosing Cisco products that can be deployed for headend devices Product sizing and

More information

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017 Integrated and Differentiated Services Christos Papadopoulos (Remixed by Lorenzo De Carli) CSU CS557, Fall 2017 1 Preliminary concepts: token buffer 2 Characterizing Traffic: Token Bucket Filter Parsimonious

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

Nortel Networks Optivity Policy Services

Nortel Networks Optivity Policy Services Sharon Fisher Product Report 7 January 2004 Nortel Networks Optivity Policy Services Summary Optivity Policy Services is system-level software for managing the traffic prioritization and network access

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters

More information

Firepower Threat Defense Site-to-site VPNs

Firepower Threat Defense Site-to-site VPNs About, on page 1 Managing, on page 3 Configuring, on page 3 Monitoring Firepower Threat Defense VPNs, on page 11 About Firepower Threat Defense site-to-site VPN supports the following features: Both IPsec

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

Virtuosity: Programmable Resource Management for Spawning Networks

Virtuosity: Programmable Resource Management for Spawning Networks Virtuosity: Programmable Resource Management for Spawning Networks Daniel Villela and Andrew T. Campbell Center for Telecommunications Research, Columbia University, USA John Vicente Intel Corporation

More information

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module

Presentation Outline. Evolution of QoS Architectures. Quality of Service Monitoring and Delivery Part 01. ICT Technical Update Module Quality of Service Monitoring and Delivery Part 01 ICT Technical Update Module Presentation Outline Introduction to IP-QoS IntServ Architecture DiffServ Architecture Post Graduate Certificate in Professional

More information

Progress Report No. 3. A Case Study on Simulation Scenario

Progress Report No. 3. A Case Study on Simulation Scenario NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 3 A Case Study on Simulation Scenario The University of Canterbury Team 21 December 2005 Progress Report This report

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract 1 of 9 6/18/2006 7:41 PM Kernel Korner Analysis of the HTB Queuing Discipline Yaron Benita Abstract Can Linux do Quality of Service in a way that both offers high throughput and does not exceed the defined

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

PassReview. PassReview - IT Certification Exams Pass Review

PassReview.   PassReview - IT Certification Exams Pass Review PassReview http://www.passreview.com PassReview - IT Certification Exams Pass Review Exam : 640-863 Title : Designing for Cisco Internetwork Solutions Vendors : Cisco Version : DEMO Get Latest & Valid

More information

Configuring IP Services

Configuring IP Services CHAPTER 8 Configuring IP Services This chapter describes how to configure optional IP services supported by the Cisco Optical Networking System (ONS) 15304. For a complete description of the commands in

More information

Networking Quality of service

Networking Quality of service System i Networking Quality of service Version 6 Release 1 System i Networking Quality of service Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

Mapping Mechanism to Enhance QoS in IP Networks

Mapping Mechanism to Enhance QoS in IP Networks Mapping Mechanism to Enhance QoS in IP Networks by Sriharsha Karamchati, Shatrunjay Rawat, Sudhir Yarram, Guru Prakash Ramaguru in The 32nd International Conference on Information Networking (ICOIN 2018)

More information